Vulnerability Description
It was possible to prevent a user from exiting pointerlock when pressing escape and to overlay customValidity notifications from a `<select>` element over certain permission prompts. This could be used to confuse a user into giving a site unintended permissions. This vulnerability affects Firefox < 128 and Thunderbird < 128.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 128.0 |
| Mozilla | Thunderbird | < 128.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1694513ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2024-29/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-32/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1694513ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2024-29/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2024-32/Vendor Advisory
FAQ
What is CVE-2024-6607?
CVE-2024-6607 is a vulnerability with a CVSS score of 8.8 (HIGH). It was possible to prevent a user from exiting pointerlock when pressing escape and to overlay customValidity notifications from a `<select>` element over certain permission prompts. This could ...
How severe is CVE-2024-6607?
CVE-2024-6607 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6607?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.